PrepAway - Latest Free Exam Questions & Answers

Category: EX0-106 (v.1)

Exam EX0-106: SCNS Tactical Perimeter Defense

Which of the following are the two common systems token-based authentication uses?

You are planning on implementing a token-based authentication system in your network. The
network currently is spread out over four floors of your building. There are plans to add three
branch offices. During your research you are analyzing the different types of systems. Which of
the following are the two common systems token-based authentication uses?

What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range?

You have been given the task of building the new wireless networks for your office, and you need
to verify that your equipment will not interfere with other wireless equipment frequencies. What
wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range?

Which of the following Snort rules will log any tcp traffic from any host other than 172.16.40.50 using any po

You are configuring your new IDS machine, where you have recently installed Snort. While you
are working with this machine, you wish to create some basic rules to test the ability to log traffic
as you desire. Which of the following Snort rules will log any tcp traffic from any host other than
172.16.40.50 using any port, to any host in the 10.0.10.0/24 network using any port?


Page 2 of 2412345...1020...Last »